[1] W. Zeng, Digital watermarking and data hiding: technologies and applications, in: Proc. Int. Conf. Inf. Syst. Anal. Synth, 1998, pp. 223-229.
[2] M. Wu, B. Liu, Data hiding in image and video. I. Fundamental issues and solutions, Image Processing, IEEE Transactions on, 12(6) (2003) 685-695.
[3] M. Wu, H. Yu, B. Liu, Data hiding in image and video. II. Designs and applications, Image Processing, IEEE Transactions on, 12(6) (2003) 696-705.
[4] C.-T. Wang, H.-F. Yu, A Markov-based reversible data hiding method based on histogram shifting, Journal of Visual Communication and Image Representation, 23(5) (2012) 798-811.
[5] X. Zhang, S. Wang, Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security, Pattern Recognition Letters, 25(3) (2004) 331-339.
[6] H.V. Desai, Steganography, Cryptography, Watermarking: A Comparitive Study, Journal of Global Research in Computer Science, 3(12) (2013) 33-35.
[7] J. Dittmann, P. Wohlmacher, K. Nahrstedt, Using cryptographic and. watermarking algorithms, Multimedia, IEEE, 8(4) (2001) 54-65.
[8] A. Abbass, E. Soleit, S. Ghoniemy, Blind video data hiding using integer wavelet transforms, Ubiquitous Computing and Communication Journal, (2007).
[9] Y. Wang, A. Pearmain, Blind image data hiding based on self reference, Pattern Recognition Letters, 25(15) (2004) 1681-1689.
[10] X.-Y. Luo, D.-S. Wang, P. Wang, F.-L. Liu, A review on blind detection for image steganography, Signal Processing, 88(9) (2008) 2138-2157.
[11] H. Yang, X. Sun, G. Sun, A high-capacity image data hiding scheme using adaptive LSB substitution, Radioengineering, 18(4) (2009) 509.
[12] R.-Z. Wang, C.-F. Lin, J.-C. Lin, Image hiding by optimal LSB substitution and genetic algorithm, Pattern recognition, 34(3) (2001) 671-683.
[13] C.-C. Thien, J.-C. Lin, A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function, Pattern Recognition, 36(12) (2003) 2875-2881.
[14] C.-C. Chang, C.-S. Chan, Y.-H. Fan, Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels, Pattern Recognition, 39(6) (2006) 1155-1167.
[15] A.D. Ker, Steganalysis of LSB matching in grayscale images, Signal Processing Letters, IEEE, 12(6) (2005) 441-444.
[16] J. Mielikainen, LSB matching revisited, Signal Processing Letters, IEEE, 13(5) (2006) 285-287.
[17] D.-C. Wu, W.-H. Tsai, A steganographic method for images by pixel-value differencing, Pattern Recognition Letters, 24(9) (2003) 1613-1626.
[18] H. Yang, X. Sun, G. Sun, A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution, Radioengineering, 18(4) (2009).
[19] Y. Zhang, J. Jiang, Y. Zha, H. Zhang, S. Zhao, Research on Embedding Capacity and Efficiency of Information Hiding Based on Digital Images, International Journal of Intelligence Science, 3 (2013) 77.
[20] B. Jena, High payload digital image steganography using mixed edge detection mechanism, 2014.
[21] Z.-X. Yin, C.-C. Chang, Q. Xu, B. Luo, Second-order steganographic method based on adaptive reference matrix, IET Image Processing, 9(4) (2015) 300-305.
[22] X. Zhang, S. Wang, Efficient steganographic embedding by exploiting modification direction, IEEE Communications Letters, 10(11) (2006) 781-783.
[23] C.-C. Chang, Y.-C. Chou, T.D. Kieu, An information hiding scheme using Sudoku, in: Innovative Computing Information and Control, 2008. ICICIC’08. 3rd International Conference on, IEEE, 2008, pp. 17-17.
[24] W. Hong, T.-S. Chen, C.-W. Shiu, A minimal Euclidean distance searching technique for Sudoku steganography, in: 2008 International Symposium on Information Science and Engineering, IEEE, 2008, pp. 515-518.
[25] R.-M. Chao, H.-C. Wu, C.-C. Lee, Y.-P. Chu, A novel image data hiding scheme with diamond encoding, EURASIP Journal on Information Security, 2009(1) (2009) 1.
[26] Z. Yin, B. Luo, MDE.based image steganography with large embedding capacity, Security and Communication Networks, (2015).
[27] R. Crandall, Some notes on steganography, Posted on steganography mailing list, (1998).
[28] A. Westfeld, F5—a steganographic algorithm, in: Information hiding, Springer, 2001, pp. 289-302.
[29] W. Zhang, S. Wang, X. Zhang, Improving embedding efficiency of covering codes for applications in steganography, Communications Letters, IEEE, 11(8) (2007) 680-682.
[30] C.-C. Chang, T.D. Kieu, Y.-C. Chou, A high payload steganographic scheme based on (7, 4) hamming code for digital images, in: Electronic Commerce and Security, 2008 International Symposium on, IEEE, 2008, pp. 16- 21.
[31] S. Singh, T.J. Siddiqui, A Security Enhanced Robust Steganography Algorithm for Data Hiding, International Journal of Computer Science Issues (IJCSI), 9(3) (2012).
[32] S.B. Wicker, Error control systems for digital communication and storage, Prentice hall Englewood Cliffs, 1995.
[33] L. Shu, S. Lin, D.J. Costello, Error control coding, Pearson Education India, 2004.